College
Essay
Miscellaneous
Pages 8 (2008 words)
Download 0
Up at the St Gregory Country Club, my friend Walter "Wally" Gropius was telling me about how they use intrusion detection systems at MalaFide Corporation where he's the CEO to identify all attacks on their computer networks. So before I approve this request for vulnerability assessment systems, I'd like to understand why we are duplicating efforts here…

Introduction


I've prepared an analysis about the use of vulnerability assessment systems and intrusion detection systems in your company, just like you asked me. You specifically asked whether the use of both systems will be a waste of resources and a duplication of efforts. My analysis suggests that VAS and IDS have separate internal functions for the security of the computer systems and both must be a part of a computer system for complete security control.
Vulnerability assessment systems are those security scanning tools that assess level of threat that can penetrate a system. The main job of such tools is to scan networks, servers, firewalls, routers, and applications and report system vulnerabilities. "Generally, the tools can detect known security flaws or bugs in software and hardware, determine if the systems are susceptible to known attacks and exploits, and search for system vulnerabilities such as settings contrary to established security policies". (Becker, 1999)
New threats are discovered each day thus the vulnerability assessment tools must be updated regularly. Any new weaknesses such as security flaws and bugs would need to be patched in the system so that no holes left for malwares, viruses, spywares etc. to infect the system. ...
Download paper
Not exactly what you need?

Related papers

Reflective Memo
Students undertaking electrical and electronics engineering can use the manual during practical lessons. The manual is simplified so that any student undertaking technical courses can follow the procedure, open a phone, identify the internal arts and repair the phone. The manual is also suitable for lecturers training engineering students. The age of the reader is about 24 years to 30 years…
Memo for Southwest Division
Memo for Southwest Division …
Interoffice Memo
I do believe that law enforcement agents can be an asset in this field of investigation where digital evidence need to be handled with care much like any physical evidence should be handled in order to be assured that evidence would not be tampered with from the time it is collected unto the time that the evidence is used in court.…
Memo Editing
1. Making the Most of Computers. Review of computer operations and provides hands-on experience in using the company's four main software packages: word processing, spreadsheet; data-base management and graphics.…
Recommendation Memo
The gaming consoles are judged on five different criterions based on the information extracted from user reviews from cnet.com, the gaming console's respective websites and from the general public opinion and perception of the brands. The five criterions are…
Memo to Manager
The giving of inexpensive gifts upon greeting, such as pens, foreign cigarettes, perfume, or shampoo are greatly appreciated by anyone, and can be used to indicate a desire for friendship.…
Memo
I've prepared an analysis about the use of vulnerability assessment systems and intrusion detection systems in your company, just like you asked me. You specifically asked whether the use of both systems will be a waste of resources and a duplication of efforts. My analysis suggests that VAS and IDS have separate internal functions for the security of the computer systems and both must be a part…